首页 > 最新文献

2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

英文 中文
Enhanced fast emergency path schema (EFEP-S) to redcue packet loss during multiple independent link failure in OSPF routing 增强快速应急路径模式EFEP-S (Enhanced fast emergency path schema),减少OSPF路由中多条独立链路故障时丢包的情况
V. Janani, R. Chandrasekar
The OSPF convergence period takes several milliseconds to update the current information about the topology. In worse transient behavior, the packets are dropped or loop may occur. It may result in network instability. The link failure recovery is important because it finds the alternative path to deviate the packets, in order to prevent the packet loss rate. An IPFRR approach, FEPS can handle single link or single node failure successfully during the convergence period. This FEPS recomputed the alternate shorter path before the failure occurs. This schema is works during the Convergence period of OSPF routing, which provides an immediate backup path. The proposed idea is to extend the existing protection method “enhanced Fast emergency path schema (EFEP-S)”, an IPFRR approach to overcome the multiple link failures occur within the local routing area of OSPF routing.
OSPF的收敛周期为几毫秒,更新拓扑的当前信息。在更糟糕的瞬态行为下,数据包可能会被丢弃或发生环路。可能导致网络不稳定。链路故障恢复很重要,因为它找到了偏离数据包的替代路径,以防止丢包率。采用IPFRR方法,FEPS可以在收敛期内成功处理单链路或单节点故障。该FEPS在故障发生之前重新计算了备用的较短路径。该模式主要工作在OSPF路由收敛期,提供快速的备份路径。提出的思想是对现有保护方法“增强快速紧急路径模式(enhanced Fast emergency path schema, EFEP-S)”的扩展,采用IPFRR方法来克服OSPF路由的本地路由区域内出现的多链路故障。
{"title":"Enhanced fast emergency path schema (EFEP-S) to redcue packet loss during multiple independent link failure in OSPF routing","authors":"V. Janani, R. Chandrasekar","doi":"10.1109/ICCCNT.2013.6726764","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726764","url":null,"abstract":"The OSPF convergence period takes several milliseconds to update the current information about the topology. In worse transient behavior, the packets are dropped or loop may occur. It may result in network instability. The link failure recovery is important because it finds the alternative path to deviate the packets, in order to prevent the packet loss rate. An IPFRR approach, FEPS can handle single link or single node failure successfully during the convergence period. This FEPS recomputed the alternate shorter path before the failure occurs. This schema is works during the Convergence period of OSPF routing, which provides an immediate backup path. The proposed idea is to extend the existing protection method “enhanced Fast emergency path schema (EFEP-S)”, an IPFRR approach to overcome the multiple link failures occur within the local routing area of OSPF routing.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"25 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82851325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Double threshold energy aware load balancing in cloud computing 云计算中的双阈值能量感知负载均衡
Jayant Adhikari, S. Patil
Nowadays implementation of local cloud is popular, organization are becoming aware of power consumed by unutilized resources. Reducing power consumption has been an essential requirement for cloud environments not only to decrease operating cost but also improve the system reliability. The energy-aware computing is not just to make algorithms run as fast as possible, but also to minimize energy requirements for computation. Our DT-PALB (Double Threshold Energy Aware Load Balancing) algorithm maintains the state of all compute nodes, and based on utilization percentages, decides the number of compute nodes that should be operating. We show that our solution provides adequate availability to compute node resources while decreasing the overall power consumed by the local cloud as compared to using load balancing techniques that are power aware.
如今,本地云的实现很流行,组织开始意识到未利用资源所消耗的能量。降低功耗已成为云环境的基本要求,不仅可以降低运营成本,还可以提高系统可靠性。能量感知计算不仅是为了使算法尽可能快地运行,而且是为了最小化计算的能量需求。我们的DT-PALB(双阈值能量感知负载均衡)算法维护所有计算节点的状态,并根据利用率百分比决定应该运行的计算节点数量。我们表明,与使用功耗感知的负载平衡技术相比,我们的解决方案为计算节点资源提供了足够的可用性,同时降低了本地云消耗的总体功耗。
{"title":"Double threshold energy aware load balancing in cloud computing","authors":"Jayant Adhikari, S. Patil","doi":"10.1109/ICCCNT.2013.6726664","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726664","url":null,"abstract":"Nowadays implementation of local cloud is popular, organization are becoming aware of power consumed by unutilized resources. Reducing power consumption has been an essential requirement for cloud environments not only to decrease operating cost but also improve the system reliability. The energy-aware computing is not just to make algorithms run as fast as possible, but also to minimize energy requirements for computation. Our DT-PALB (Double Threshold Energy Aware Load Balancing) algorithm maintains the state of all compute nodes, and based on utilization percentages, decides the number of compute nodes that should be operating. We show that our solution provides adequate availability to compute node resources while decreasing the overall power consumed by the local cloud as compared to using load balancing techniques that are power aware.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"23 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89561260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Globular topology of large scale WSN for efficient load balancing using multiple sink node 基于多汇聚节点的大规模无线传感器网络的全局拓扑结构
S. Prabhavathi, A. Rao, A. Subramanyam
Ensuring efficient and fast data aggregation technique is the challenging task when it is considered for the large-scale wireless sensor network (WSN). The problems of presence of single sink, the distance between sink and cluster, as well as type of presence of dynamic task to be performed within different cluster is extremely difficult to address for reliable data aggregation technique in WSN. Therefore, the proposed system introduces a novel globular topology of WSN that ensures an efficient task allocation strategy in large-scale WSN architecture. The performance of the data aggregation process is further increased by considering the presence of multiple mobile sink that adds an exponential benefit to the task allocation policy proposed. The results simulated in Matlab shows satisfactory performance by considering the packet delivery ratio, delay minimization, and completion time of the data aggregation process.
在考虑大规模无线传感器网络(WSN)时,保证高效、快速的数据聚合技术是一项具有挑战性的任务。单个汇聚点的存在、汇聚点与集群的距离以及不同集群内要执行的动态任务的存在类型等问题是WSN可靠数据聚合技术中极难解决的问题。因此,该系统引入了一种新的WSN全局拓扑结构,保证了大规模WSN体系结构中高效的任务分配策略。通过考虑多个移动sink的存在,进一步提高了数据聚合过程的性能,为所提出的任务分配策略增加了指数级效益。在Matlab中进行的仿真结果表明,从分组传输率、时延最小化和数据聚合过程的完成时间等方面考虑,该算法具有令人满意的性能。
{"title":"Globular topology of large scale WSN for efficient load balancing using multiple sink node","authors":"S. Prabhavathi, A. Rao, A. Subramanyam","doi":"10.1109/ICCCNT.2013.6726754","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726754","url":null,"abstract":"Ensuring efficient and fast data aggregation technique is the challenging task when it is considered for the large-scale wireless sensor network (WSN). The problems of presence of single sink, the distance between sink and cluster, as well as type of presence of dynamic task to be performed within different cluster is extremely difficult to address for reliable data aggregation technique in WSN. Therefore, the proposed system introduces a novel globular topology of WSN that ensures an efficient task allocation strategy in large-scale WSN architecture. The performance of the data aggregation process is further increased by considering the presence of multiple mobile sink that adds an exponential benefit to the task allocation policy proposed. The results simulated in Matlab shows satisfactory performance by considering the packet delivery ratio, delay minimization, and completion time of the data aggregation process.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"7 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87362916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Objective assesment of different segmentation algorithm for underwater images 客观评价不同的水下图像分割算法
Jayanta Acharya, S. Gadhiya, Kapil S. Raviya
The quality of underwater images is directly affected by water medium, atmosphere medium, pressure and Temperature. This emphasizes the necessity of image segmentation, which divides an image into parts that have strong correlations with objects to reflect the actual information collected from the real world. Image segmentation is the most practical approach among virtually all automated image recognition systems. Feature extraction and recognition have numerous applications on telecommunication, weather forecasting, environment exploration and medical diagnosis. Different segmentation techniques are available in the literature for segmenting or simplifying the underwater images. The performance of an image segmentation algorithm depends on its simplification of image. In this paper, different segmentation algorithms namely, edge based image segmentation, adaptive image thresolding, K-means segmentation, Fuzzy c means(FCM), and Fuzzy C Means with thresholding (FCMT) are implemented for underwater images and they are compared using objective assesment parameter like Energy, Discrete Entropy, Relative Entropy, Mutual Information and Redundancy. Out of the above methods the experimental results show that Fuzzy C means with Thresholding (FCMT) algorithm performs better than other methods in processing underwater images.
水介质、大气介质、压力和温度直接影响水下图像的质量。这就强调了图像分割的必要性,将图像分割成与物体有较强相关性的部分,以反映从现实世界中采集到的实际信息。在几乎所有的自动图像识别系统中,图像分割是最实用的方法。特征提取和识别在电信、天气预报、环境勘探和医疗诊断等领域有着广泛的应用。文献中有不同的分割技术用于分割或简化水下图像。图像分割算法的性能取决于其对图像的简化程度。本文对水下图像实现了基于边缘的图像分割、自适应图像阈值分割、K-means分割、模糊c均值(FCM)和模糊c均值带阈值分割(FCMT)等不同的分割算法,并利用能量、离散熵、相对熵、互信息和冗余等客观评价参数对它们进行了比较。实验结果表明,模糊C均值阈值(FCMT)算法在处理水下图像方面的性能优于其他方法。
{"title":"Objective assesment of different segmentation algorithm for underwater images","authors":"Jayanta Acharya, S. Gadhiya, Kapil S. Raviya","doi":"10.1109/ICCCNT.2013.6726489","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726489","url":null,"abstract":"The quality of underwater images is directly affected by water medium, atmosphere medium, pressure and Temperature. This emphasizes the necessity of image segmentation, which divides an image into parts that have strong correlations with objects to reflect the actual information collected from the real world. Image segmentation is the most practical approach among virtually all automated image recognition systems. Feature extraction and recognition have numerous applications on telecommunication, weather forecasting, environment exploration and medical diagnosis. Different segmentation techniques are available in the literature for segmenting or simplifying the underwater images. The performance of an image segmentation algorithm depends on its simplification of image. In this paper, different segmentation algorithms namely, edge based image segmentation, adaptive image thresolding, K-means segmentation, Fuzzy c means(FCM), and Fuzzy C Means with thresholding (FCMT) are implemented for underwater images and they are compared using objective assesment parameter like Energy, Discrete Entropy, Relative Entropy, Mutual Information and Redundancy. Out of the above methods the experimental results show that Fuzzy C means with Thresholding (FCMT) algorithm performs better than other methods in processing underwater images.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88293076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A novel approach for USB2.0 validation on System on Chip USB2.0在片上系统验证的新方法
M. Pandey, Shwetank Shekhar, Joginder Singh, G. Agarwal, Nitin Saxena
In peripheral to peripheral communication, USB2.0 continues to occupy prominent position. With the emergence of USB2.0 peripherals, figuring out a standard, reliable and robust approach that can validate USB2.0 on System on Chip (SoC) is the need of an hour. The performance of USB depends fundamentally on electrical characteristics. Using this innovative approach (validation using U-Boot framework) we have root-caused several notorious issues which were hard to narrow down using legacy approach. This methodology possesses both the legacy capability of low level programming (JTAG) as well as of application level (High Level) programming (Linux). The paper is presented using case study of some issues which were reflected in the system using this methodology only.
在外设到外设通信中,USB2.0继续占据着突出的地位。随着USB2.0外设的出现,找出一个标准的、可靠的、健壮的方法来验证USB2.0在片上系统(SoC)是需要一个小时的。USB的性能基本上取决于电气特性。使用这种创新的方法(使用U-Boot框架进行验证),我们已经从根本上解决了几个臭名昭著的问题,这些问题很难使用传统方法来缩小范围。这种方法既具有低级编程(JTAG)的遗留功能,也具有应用程序级编程(高级)的遗留功能(Linux)。本文仅使用这种方法对系统中反映的一些问题进行了案例研究。
{"title":"A novel approach for USB2.0 validation on System on Chip","authors":"M. Pandey, Shwetank Shekhar, Joginder Singh, G. Agarwal, Nitin Saxena","doi":"10.1109/ICCCNT.2013.6726615","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726615","url":null,"abstract":"In peripheral to peripheral communication, USB2.0 continues to occupy prominent position. With the emergence of USB2.0 peripherals, figuring out a standard, reliable and robust approach that can validate USB2.0 on System on Chip (SoC) is the need of an hour. The performance of USB depends fundamentally on electrical characteristics. Using this innovative approach (validation using U-Boot framework) we have root-caused several notorious issues which were hard to narrow down using legacy approach. This methodology possesses both the legacy capability of low level programming (JTAG) as well as of application level (High Level) programming (Linux). The paper is presented using case study of some issues which were reflected in the system using this methodology only.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"45 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89063944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Querying RDF and OWL data source using SPARQL 使用SPARQL查询RDF和OWL数据源
Naveen Kumar, Suresh Kumar
The Semantic web is the extension of WWW, “web of document” that provide a support for “web of data” it gives an easier way to find, share, reuse and combine information. The semantic web can be best known as the web of linked data that enables people to create data stores on the web, build vocabularies, and write rules for handling data. It is based on machine-readable information and builds on XML technology's capability to define customized tagging schemes and RDF's (Resource Description Framework) flexible approach to representing data. The key challenge for many semantic web application is to access RDF and OWL data source, as a solution to this challenge, SPARQL, the w3c Recommendation for an RDF query language, supports querying of multiple RDF graphs and OWL data. In this paper we propose a framework for querying RDF data and OWL data using SPARQL. We perform querying the data using “TWINKLE” and “PROTEGE” tool and we also provide an experimental result of improving query performance by optimizing the query.
语义网是WWW(“文档网”)的扩展,它为“数据网”提供了支持,它提供了一种更简单的方法来查找、共享、重用和组合信息。语义网最为人所知的是链接数据网,它使人们能够在网络上创建数据存储、构建词汇表和编写处理数据的规则。它基于机器可读的信息,并建立在XML技术定义定制标记方案的能力和RDF(资源描述框架)表示数据的灵活方法的基础上。许多语义web应用程序面临的主要挑战是访问RDF和OWL数据源,作为解决这一挑战的方案,SPARQL (w3c推荐的RDF查询语言)支持查询多个RDF图和OWL数据。本文提出了一个使用SPARQL查询RDF数据和OWL数据的框架。我们使用“TWINKLE”和“PROTEGE”工具对数据进行了查询,并提供了通过优化查询提高查询性能的实验结果。
{"title":"Querying RDF and OWL data source using SPARQL","authors":"Naveen Kumar, Suresh Kumar","doi":"10.1109/ICCCNT.2013.6726698","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726698","url":null,"abstract":"The Semantic web is the extension of WWW, “web of document” that provide a support for “web of data” it gives an easier way to find, share, reuse and combine information. The semantic web can be best known as the web of linked data that enables people to create data stores on the web, build vocabularies, and write rules for handling data. It is based on machine-readable information and builds on XML technology's capability to define customized tagging schemes and RDF's (Resource Description Framework) flexible approach to representing data. The key challenge for many semantic web application is to access RDF and OWL data source, as a solution to this challenge, SPARQL, the w3c Recommendation for an RDF query language, supports querying of multiple RDF graphs and OWL data. In this paper we propose a framework for querying RDF data and OWL data using SPARQL. We perform querying the data using “TWINKLE” and “PROTEGE” tool and we also provide an experimental result of improving query performance by optimizing the query.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"53 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79177217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An algorithm to enhance security in RSA RSA中增强安全性的一种算法
Rohit Minni, Kaushal Sultania, Saurabh Mishra, D. Vincent
In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key. This is also called Public Key Cryptography. For every public key there can exist only one private key that can decipher the encrypted text. Security of RSA Algorithm can be compromised using mathematical attack, by guessing the factors of a large number. It may also be compromised if one can guess the private key. In accordance with the mathematical attack, we propose a secure algorithm in this paper. In this algorithm, we try to eliminate the distribution of n which is the large number whose factors if found compromises the RSA algorithm. We also present a comparative analysis of the proposed algorithm with the RSA algorithm.
在对称密钥加密中,发送方和接收方拥有一个共同的密钥。非对称密钥密码学涉及生成两个不同的密钥,用于相应的加密和解密。发送方使用公钥将原始消息转换为密文,而接收方可以使用其私钥对其进行解密。这也被称为公钥加密。对于每个公钥,只能存在一个可以解密加密文本的私钥。RSA算法的安全性可以通过猜测一个大数的因数而受到数学攻击。如果有人可以猜出私钥,它也可能被破坏。针对这种数学攻击,本文提出了一种安全算法。在这个算法中,我们试图消除n的分布,n是一个大数,如果发现它的因数会危及RSA算法。我们还将所提出的算法与RSA算法进行了比较分析。
{"title":"An algorithm to enhance security in RSA","authors":"Rohit Minni, Kaushal Sultania, Saurabh Mishra, D. Vincent","doi":"10.1109/ICCCNT.2013.6726517","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726517","url":null,"abstract":"In symmetric key cryptography the sender as well as the receiver possess a common key. Asymmetric key cryptography involves generation of two distinct keys which are used for encryption and decryption correspondingly. The sender converts the original message to cipher text using the public key while the receiver can decipher this using his private key. This is also called Public Key Cryptography. For every public key there can exist only one private key that can decipher the encrypted text. Security of RSA Algorithm can be compromised using mathematical attack, by guessing the factors of a large number. It may also be compromised if one can guess the private key. In accordance with the mathematical attack, we propose a secure algorithm in this paper. In this algorithm, we try to eliminate the distribution of n which is the large number whose factors if found compromises the RSA algorithm. We also present a comparative analysis of the proposed algorithm with the RSA algorithm.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"20 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77079387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 44
A survey on scalable image indexing and searching 可扩展图像索引与检索的研究进展
S. Suchitra, S. Chitrakala
Content-based image retrieval (CBIR) has been one of the most research areas in the field of computer vision over the last ten years. CBIR is a problem that is getting more and more attention. Many of the research works had been undertaken in the past decade to design efficient image retrieval techniques from the image or multimedia databases. Although large number of indexing and retrieval techniques has been developed, there is still no universally accepted feature extraction, indexing and retrieval technique available. The amount of image data that has to be stored, managed, searched, and retrieved grows continuously on many fields of industry and research. One key challenge in CBIR is to develop a fast solution for indexing high-dimensional image contents, which is crucial to building large-scale CBIR systems. In this survey presents a highlight on the role of image indexing. It also point out scope and challenges in designing of image retrieval systems.
基于内容的图像检索(CBIR)是近十年来计算机视觉领域研究的热点之一。CBIR是一个越来越受到重视的问题。在过去十年中进行了许多研究工作,以设计从图像或多媒体数据库中有效检索图像的技术。虽然已经开发了大量的索引和检索技术,但目前还没有一个普遍接受的特征提取、索引和检索技术。在许多工业和研究领域,必须存储、管理、搜索和检索的图像数据量不断增长。CBIR的一个关键挑战是开发一种快速的高维图像内容索引解决方案,这对于构建大规模的CBIR系统至关重要。在本调查中,重点介绍了图像索引的作用。指出了图像检索系统设计的范围和挑战。
{"title":"A survey on scalable image indexing and searching","authors":"S. Suchitra, S. Chitrakala","doi":"10.1109/ICCCNT.2013.6726512","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726512","url":null,"abstract":"Content-based image retrieval (CBIR) has been one of the most research areas in the field of computer vision over the last ten years. CBIR is a problem that is getting more and more attention. Many of the research works had been undertaken in the past decade to design efficient image retrieval techniques from the image or multimedia databases. Although large number of indexing and retrieval techniques has been developed, there is still no universally accepted feature extraction, indexing and retrieval technique available. The amount of image data that has to be stored, managed, searched, and retrieved grows continuously on many fields of industry and research. One key challenge in CBIR is to develop a fast solution for indexing high-dimensional image contents, which is crucial to building large-scale CBIR systems. In this survey presents a highlight on the role of image indexing. It also point out scope and challenges in designing of image retrieval systems.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"397 1","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76458622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Packet hiding using cryptography with advanced key management against counter jamming attacks in wireless sensor networks 无线传感器网络中采用先进密钥管理和加密技术的数据包隐藏
S. Swaminathan, S. Suganya, K. Ambika
In a wireless network, when the adversary is being part of the network, they are well known about the protocol being used and other network secrets. A transceiver is enough to get the key and decrypt the message. Hence, simple cryptographic mechanism is not enough to protect the message. Moreover, jamming can be easily performed by modifying the packet header. Hence we have to go for advanced mechanism to protect our message. At the message level permutation and padding are used to protect the message and at the communication level puzzle is used to hide the key. A puzzle solver module in the client system can solve the puzzle and get the key.
在无线网络中,当攻击者是网络的一部分时,他们非常了解正在使用的协议和其他网络机密。一个收发器就足以获得密钥并解密消息。因此,简单的加密机制不足以保护消息。此外,通过修改包头可以很容易地进行干扰。因此,我们必须采用先进的机制来保护我们的信息。在消息级使用置换和填充来保护消息,在通信级使用谜题来隐藏密钥。客户端系统中的解谜器模块可以解谜并获得密钥。
{"title":"Packet hiding using cryptography with advanced key management against counter jamming attacks in wireless sensor networks","authors":"S. Swaminathan, S. Suganya, K. Ambika","doi":"10.1109/ICCCNT.2013.6726540","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726540","url":null,"abstract":"In a wireless network, when the adversary is being part of the network, they are well known about the protocol being used and other network secrets. A transceiver is enough to get the key and decrypt the message. Hence, simple cryptographic mechanism is not enough to protect the message. Moreover, jamming can be easily performed by modifying the packet header. Hence we have to go for advanced mechanism to protect our message. At the message level permutation and padding are used to protect the message and at the communication level puzzle is used to hide the key. A puzzle solver module in the client system can solve the puzzle and get the key.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"5 1","pages":"1-4"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86222012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance analysis of branch-and-bound approach with various model-selection clustering techniques for image data point 基于不同模型选择聚类技术的分支定界方法对图像数据点的性能分析
C. S. Sasireka, P. Raviraj
In data mining context, for efficient data analysis recent researchers utilized branch-and-bound methods such as clustering, seriation and feature selection. Traditional cluster search was done with different partitioning schemes to optimize the cluster formation. Considering image data, partitioning approaches seems to be computationally complex due to large data size, and uncertainty of number of clusters. Recent work presented a new version of branch and bound model called model selection problem, handles the clustering issues more efficiently. For model-based clustering problems, to assign data point to appropriate cluster, cluster parameters should be known. Cluster parameters are computed only if the cluster assignments are known. Data point is assigned to the cluster based on most matching model such as Navigation and Cost Model, Segment Representation in SwiftRule and Analytic model. If the problem-specific bounds and/or added heuristics in the data points of the domain area get surmounted, memory overheads, specific model selection, and uncertain data points cause various clustering abnormalities. In addition cluster validity and purity needs to be testified for efficiency of problem-specific bound on certain domain areas of image data clustering. Experimental evaluation on the model selection approach of cluster model shows the improvement in accuracy, computational complexity and execution time, when compared to Navigation and Cost Model, Segment Representation in SwiftRule and Analytic model.
在数据挖掘领域,为了有效地分析数据,近年来研究人员采用了聚类、序列化和特征选择等分支定界方法。传统的聚类搜索是通过不同的划分方案来优化聚类的形成。对于图像数据,由于数据量大、聚类数量的不确定性,分区方法的计算量显得很复杂。最近的研究提出了一个分支定界模型的新版本,称为模型选择问题,它更有效地处理了聚类问题。对于基于模型的聚类问题,为了将数据点分配到合适的聚类中,需要知道聚类参数。只有在集群分配已知的情况下才计算集群参数。基于导航和成本模型、SwiftRule中的分段表示和Analytic模型等大多数匹配模型为聚类分配数据点。如果超越了特定于问题的边界和/或在域区域的数据点中添加的启发式,则内存开销、特定的模型选择和不确定的数据点会导致各种聚类异常。此外,为了在图像数据聚类的某些领域上实现问题特定界的效率,还需要验证聚类的有效性和纯度。对聚类模型模型选择方法的实验评价表明,与导航和成本模型、SwiftRule中的分段表示和Analytic模型相比,聚类模型在准确率、计算复杂度和执行时间上都有提高。
{"title":"Performance analysis of branch-and-bound approach with various model-selection clustering techniques for image data point","authors":"C. S. Sasireka, P. Raviraj","doi":"10.1109/ICCCNT.2013.6726522","DOIUrl":"https://doi.org/10.1109/ICCCNT.2013.6726522","url":null,"abstract":"In data mining context, for efficient data analysis recent researchers utilized branch-and-bound methods such as clustering, seriation and feature selection. Traditional cluster search was done with different partitioning schemes to optimize the cluster formation. Considering image data, partitioning approaches seems to be computationally complex due to large data size, and uncertainty of number of clusters. Recent work presented a new version of branch and bound model called model selection problem, handles the clustering issues more efficiently. For model-based clustering problems, to assign data point to appropriate cluster, cluster parameters should be known. Cluster parameters are computed only if the cluster assignments are known. Data point is assigned to the cluster based on most matching model such as Navigation and Cost Model, Segment Representation in SwiftRule and Analytic model. If the problem-specific bounds and/or added heuristics in the data points of the domain area get surmounted, memory overheads, specific model selection, and uncertain data points cause various clustering abnormalities. In addition cluster validity and purity needs to be testified for efficiency of problem-specific bound on certain domain areas of image data clustering. Experimental evaluation on the model selection approach of cluster model shows the improvement in accuracy, computational complexity and execution time, when compared to Navigation and Cost Model, Segment Representation in SwiftRule and Analytic model.","PeriodicalId":6330,"journal":{"name":"2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"53 3 1","pages":"1-9"},"PeriodicalIF":0.0,"publicationDate":"2013-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77309755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1